/macosx-10.10/CPAN-56/Modules/File-Find-Rule-0.33/ |
H A D | Makefile | 1 NAME = File-Find-Rule
|
/macosx-10.10/Security-57031.1.35/Security/include/security_codesigning/ |
H A D | dirscanner.h | 70 class Rule : public ResourceBuilder::Rule { class in class:Security::CodeSigning::DirValidator 72 Rule(const std::string &pattern, uint32_t flags, TargetPatternBuilder targetBlock); 73 ~Rule(); 80 void addRule(Rule *rule) { mRules.push_back(rule); } 95 { addRule(new Rule(namePattern, flags, targetBlock)); } 97 { addRule(new Rule(namePattern, flags | required, targetBlock)); mRequireCount++; } 107 Rule * match(const char *relpath, uint32_t flags, bool executable, const char *target = NULL); 110 typedef std::vector<Rule *> Rules;
|
H A D | resources.h | 67 class Rule : private regex_t { class in class:Security::CodeSigning::ResourceBuilder 69 Rule(const std::string &pattern, Weight weight, uint32_t flags); 70 ~Rule(); 78 void addRule(Rule *rule) { mRules.push_back(rule); } 79 void addExclusion(const std::string &pattern) { mRules.insert(mRules.begin(), new Rule(pattern, 0, exclusion)); } 83 typedef void (^Scanner)(FTSENT *ent, uint32_t flags, const char *relpath, Rule *rule); 86 Rule *findRule(string path) const; 100 typedef std::vector<Rule *> Rules;
|
H A D | dirscanner.cpp | 89 std::set<Rule *> reqMatched; 94 Rule *rule = NULL; 136 DirValidator::Rule * DirValidator::match(const char *path, uint32_t flags, bool executable, const char *target) 139 Rule *rule = *it; 162 DirValidator::Rule::Rule(const string &pattern, uint32_t flags, TargetPatternBuilder targetBlock) function in class:Security::CodeSigning::DirValidator::Rule 163 : ResourceBuilder::Rule(pattern, 0, flags), mTargetBlock(NULL) 169 DirValidator::Rule::~Rule() 175 bool DirValidator::Rule [all...] |
H A D | resources.cpp | 119 addRule(new Rule(pattern, weight, flags)); 165 if (Rule *rule = findRule(relpath)) 177 if (Rule *rule = findRule(relpath)) 186 if (Rule *rule = findRule(relpath)) { 228 if (Rule *rule = findRule(path)) 239 ResourceBuilder::Rule *ResourceBuilder::findRule(string path) const 241 Rule *bestRule = NULL; 244 Rule *rule = *it; 282 ResourceBuilder::Rule::Rule(cons function in class:Security::CodeSigning::ResourceBuilder::Rule [all...] |
H A D | signer.cpp | 279 typedef ResourceBuilder::Rule Rule; typedef 302 resources.scan(^(FTSENT *ent, uint32_t ruleFlags, const char *relpath, Rule *rule) { 338 resources.scan(^(FTSENT *ent, uint32_t ruleFlags, const char *relpath, Rule *rule) {
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_codesigning/lib/ |
H A D | dirscanner.h | 70 class Rule : public ResourceBuilder::Rule { class in class:Security::CodeSigning::DirValidator 72 Rule(const std::string &pattern, uint32_t flags, TargetPatternBuilder targetBlock); 73 ~Rule(); 80 void addRule(Rule *rule) { mRules.push_back(rule); } 95 { addRule(new Rule(namePattern, flags, targetBlock)); } 97 { addRule(new Rule(namePattern, flags | required, targetBlock)); mRequireCount++; } 107 Rule * match(const char *relpath, uint32_t flags, bool executable, const char *target = NULL); 110 typedef std::vector<Rule *> Rules;
|
H A D | resources.h | 67 class Rule : private regex_t { class in class:Security::CodeSigning::ResourceBuilder 69 Rule(const std::string &pattern, Weight weight, uint32_t flags); 70 ~Rule(); 78 void addRule(Rule *rule) { mRules.push_back(rule); } 79 void addExclusion(const std::string &pattern) { mRules.insert(mRules.begin(), new Rule(pattern, 0, exclusion)); } 83 typedef void (^Scanner)(FTSENT *ent, uint32_t flags, const char *relpath, Rule *rule); 86 Rule *findRule(string path) const; 100 typedef std::vector<Rule *> Rules;
|
H A D | dirscanner.cpp | 89 std::set<Rule *> reqMatched; 94 Rule *rule = NULL; 136 DirValidator::Rule * DirValidator::match(const char *path, uint32_t flags, bool executable, const char *target) 139 Rule *rule = *it; 162 DirValidator::Rule::Rule(const string &pattern, uint32_t flags, TargetPatternBuilder targetBlock) function in class:Security::CodeSigning::DirValidator::Rule 163 : ResourceBuilder::Rule(pattern, 0, flags), mTargetBlock(NULL) 169 DirValidator::Rule::~Rule() 175 bool DirValidator::Rule [all...] |
H A D | resources.cpp | 119 addRule(new Rule(pattern, weight, flags)); 165 if (Rule *rule = findRule(relpath)) 177 if (Rule *rule = findRule(relpath)) 186 if (Rule *rule = findRule(relpath)) { 228 if (Rule *rule = findRule(path)) 239 ResourceBuilder::Rule *ResourceBuilder::findRule(string path) const 241 Rule *bestRule = NULL; 244 Rule *rule = *it; 282 ResourceBuilder::Rule::Rule(cons function in class:Security::CodeSigning::ResourceBuilder::Rule [all...] |
H A D | signer.cpp | 279 typedef ResourceBuilder::Rule Rule; typedef 302 resources.scan(^(FTSENT *ent, uint32_t ruleFlags, const char *relpath, Rule *rule) { 338 resources.scan(^(FTSENT *ent, uint32_t ruleFlags, const char *relpath, Rule *rule) {
|
/macosx-10.10/CPANInternal-159.1/DateTime-Format-ISO8601-0.07/t/ |
H A D | 99_pod.t | 9 eval "require File::Find::Rule"; 12 print "1..1\nok 1 # skip File::Find::Rule not installed\n"; 15 @files = File::Find::Rule->file()->name( '*.pm', '*.pod' )->in( 'blib/lib' );
|
/macosx-10.10/ruby-106/ruby/lib/rdoc/markup/ |
H A D | rule.rb | 4 class RDoc::Markup::Rule < Struct.new :weight
|
H A D | text_formatter_test_case.rb | 53 @to.accept_rule @RM::Rule.new(1)
|
/macosx-10.10/Security-57031.1.35/securityd/src/ |
H A D | AuthorizationRule.h | 38 class Rule; 46 OSStatus evaluate(const AuthItemRef &inRight, const Rule &inRule, AuthItemSet &environmentToClient, 58 OSStatus evaluateCredentialForRight(const AuthorizationToken &auth, const AuthItemRef &inRight, const Rule &inRule, 61 OSStatus evaluateUserCredentialForRight(const AuthorizationToken &auth, const AuthItemRef &inRight, const Rule &inRule, const AuthItemSet &environment, CFAbsoluteTime now, const Credential &credential, bool ignoreShared, SecurityAgent::Reason &reason) const; 63 OSStatus evaluateRules(const AuthItemRef &inRight, const Rule &inRule, 68 void setAgentHints(const AuthItemRef &inRight, const Rule &inTopLevelRule, AuthItemSet &environmentToClient, AuthorizationToken &auth) const; 71 OSStatus evaluateAuthentication(const AuthItemRef &inRight, const Rule &inRule, AuthItemSet &environmentToClient, AuthorizationFlags flags, CFAbsoluteTime now, const CredentialSet *inCredentials, CredentialSet &credentials, AuthorizationToken &auth, SecurityAgent::Reason &reason, bool savePassword) const; 73 OSStatus evaluateUser(const AuthItemRef &inRight, const Rule &inRule, 78 OSStatus evaluateMechanismOnly(const AuthItemRef &inRight, const Rule &inRule, AuthItemSet &environmentToClient, AuthorizationToken &auth, CredentialSet &outCredentials, bool savePassword) const; 81 OSStatus evaluateSessionOwner(const AuthItemRef &inRight, const Rule 151 class Rule : public RefPointer<RuleImpl> class in namespace:Authorization [all...] |
H A D | AuthorizationDBPlist.h | 51 Rule getRule(const AuthItemRef &inRight) const; 72 map<string,Rule> mRules;
|
H A D | AuthorizationDBPlist.cpp | 281 mRules[keyString] = Rule(keyString, definition, mConfigRules); 293 Rule newRule(inRightName, inRightDefinition, mConfigRules); 336 Rule 345 return Rule(); 348 map<string,Rule>::const_iterator rule = mRules.find(key);
|
H A D | AuthorizationRule.cpp | 55 // Rule class 327 mRuleDef.push_back(Rule(ruleDefString, cfRuleDef, cfRules)); 343 mRuleDef.push_back(Rule(*it, cfRuleDef, cfRules)); 374 Syslog::alert("Rule '%s' for right '%s' does not exist or is not properly formed", ruleName.c_str(), inRightName.c_str()); 377 mRuleDef.push_back(Rule(ruleName, cfRuleDef, cfRules)); 385 RuleImpl::~Rule() 391 RuleImpl::setAgentHints(const AuthItemRef &inRight, const Rule &inTopLevelRule, AuthItemSet &environmentToClient, AuthorizationToken &auth) const 456 RuleImpl::evaluateAuthentication(const AuthItemRef &inRight, const Rule &inRule,AuthItemSet &environmentToClient, AuthorizationFlags flags, CFAbsoluteTime now, const CredentialSet *inCredentials, CredentialSet &credentials, AuthorizationToken &auth, SecurityAgent::Reason &reason, bool savePassword) const 668 RuleImpl::evaluateSessionOwner(const AuthItemRef &inRight, const Rule &inRule, const AuthItemSet &environment, const CFAbsoluteTime now, const AuthorizationToken &auth, Credential &credential, SecurityAgent::Reason &reason) const 698 RuleImpl::evaluateCredentialForRight(const AuthorizationToken &auth, const AuthItemRef &inRight, const Rule 1112 Rule::Rule() : RefPointer<RuleImpl>(new RuleImpl()) {} function in class:Authorization::Rule 1113 Rule::Rule(const string &inRightName, CFDictionaryRef cfRight, CFDictionaryRef cfRules) : RefPointer<RuleImpl>(new RuleImpl(inRightName, cfRight, cfRules)) {} function in class:Authorization::Rule [all...] |
/macosx-10.10/WebCore-7600.1.25/css/ |
H A D | CSSRuleList.h | 76 template <class Rule> 79 LiveCSSRuleList(Rule* rule) : m_rule(rule) { } 89 Rule* m_rule;
|
/macosx-10.10/WebCore-7600.1.25/html/parser/ |
H A D | CSSPreloadScanner.h | 53 Rule, enumerator in enum:WebCore::CSSPreloadScanner::State
|
H A D | CSSPreloadScanner.cpp | 104 m_state = Rule; 108 case Rule:
|
/macosx-10.10/ruby-106/ruby/lib/rdoc/ |
H A D | markup.rb | 851 autoload :Rule, 'rdoc/markup/rule'
|
H A D | test_case.rb | 120 # Shortcut for RDoc::Markup::Rule.new with +weight+ 123 @RM::Rule.new weight
|
/macosx-10.10/WebInspectorUI-7600.1.17/UserInterface/Models/ |
H A D | CSSStyleDeclaration.js | 54 Rule: "css-style-declaration-type-rule", property in class:WebInspector.CSSStyleDeclaration.Type 92 return !!this._id && ((this._type === WebInspector.CSSStyleDeclaration.Type.Rule && this._ownerRule && this._ownerRule.editable) || this._type === WebInspector.CSSStyleDeclaration.Type.Inline);
|
/macosx-10.10/WebInspectorUI-7600.1.17/UserInterface/Views/ |
H A D | CSSStyleDeclarationSection.js | 63 case WebInspector.CSSStyleDeclaration.Type.Rule: 181 case WebInspector.CSSStyleDeclaration.Type.Rule:
|